Sciweavers

91 search results - page 9 / 19
» Survivable key compromise in software update systems
Sort
View
ASE
2006
78views more  ASE 2006»
14 years 9 months ago
Using software evolution to focus architectural recovery
Ideally, a software project commences with requirements gathering and specification, reaches its major milestone with system implementation and delivery, and then continues, possi...
Nenad Medvidovic, Vladimir Jakobac
LISA
2007
15 years 3 days ago
Secure Isolation of Untrusted Legacy Applications
Existing applications often contain security holes that are not patched until after the system has already been compromised. Even when software updates are available, applying the...
Shaya Potter, Jason Nieh, Matt Selsky
EUROCRYPT
1997
Springer
15 years 1 months ago
The GCHQ Protocol and Its Problems
The UK government is fielding an architecture for secure electronic mail based on the NSA’s Message Security Protocol, with a key escrow scheme inspired by Diffie-Hellman. Attem...
Ross J. Anderson, Michael Roe
CGO
2005
IEEE
15 years 3 months ago
Reactive Techniques for Controlling Software Speculation
Aggressive software speculation holds significant potential, because it enables program transformations to reduce the program’s critical path. Like any form of speculation, how...
Craig B. Zilles, Naveen Neelakantam
RE
2008
Springer
14 years 9 months ago
A Case Study in Eliciting Scalability Requirements
Scalability is widely recognized as an important software quality, but it is a quality that historically has lacked a consistent and systematic treatment. To address this problem,...
Leticia Duboc, Emmanuel Letier, David S. Rosenblum...